Lines Matching +full:initial +full:- +full:key

25 Provisioning is a five-step process, involving the following steps:
29 * Public key exchange
44 Of Band information, such as the device's public key or an authentication
50 ---------------------------
54 encoded as a single utf-8 data point, or the special ``none`` scheme, encoded
56 <https://www.bluetooth.com/specifications/assigned-numbers/>`_.
60 .. list-table:: URI encoding examples
62 * - URI
63 - Encoded
64 * - ``http://example.com``
65 - ``\x16//example.com``
66 * - ``https://www.zephyrproject.org/``
67 - ``\x17//www.zephyrproject.org/``
68 * - ``just a string``
69 - ``\x01just a string``
83 Public key exchange
87 device exchange public keys, either in-band or Out of Band (OOB).
89 In-band public key exchange is a part of the provisioning process and always
92 If the application wants to support public key exchange via OOB, it needs to
94 will reflect this in its capabilities. The provisioner obtains the public key
96 containing the public key or it can be encoded in a QR code printed on the
98 the public key for the Out of Band exchange, the provisioner may choose to
99 exchange the public key in-band if it can't retrieve the public key via OOB
100 mechanism. In this case, a new key pair will be generated by the mesh stack
103 To enable support of OOB public key on the unprovisioned device side,
109 provided in big-endian bytes order.
111 To provide the device's public key obtained via OOB,
117 After the initial exchange, the provisioner selects an Out of Band (OOB)
161 * A network key
165 * Key refresh
168 Additionally, a device key is generated for the node. All this data is stored
175 Depending on the choice of public key exchange mechanism and authentication method,
185 should use a static OOB value and OOB public key transfer.